Contact us today!
406-730-5105

Facebook icon Twitter icon Linkedin icon Google Plus icon yelpicon youtube RSS Feed

Eckstrom Consulting Blog

Eckstrom Consulting has been serving the Whitefish area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

KRACK Kills! KRACK WiFi Vulnerability Exposed. Learn How to Protect Your Business Here:

KRACK Kills! KRACK WiFi Vulnerability Exposed. Learn How to Protect Your Business Here:

 

KRACK kills...your WiFi security. WPA2 has been the standard for securing Wi-Fi access points- especially for businesses. However, a newly discovered flaw, has emerged; allowing cybercriminals to reuse the encryption keys initially generated when a device and router connect…in turn allowing data interception from these devices. 

Continue reading

Tip of the Week: How to Insert a Table of Contents Into a Google Document

Tip of the Week: How to Insert a Table of Contents Into a Google Document

 

If you author a long document, having a table of contents can help your readers get the information they need fast. Here is how to insert a table of contents into a Google Doc.

Continue reading

The New Google Pixel Will Come With Zero-Touch Provisioning. Great. What is it?

The New Google Pixel Will Come With Zero-Touch Provisioning. Great. What is it?

Does your business use Google’s line of Android devices for business purposes? Well, you might be happy to hear about Google’s new zero-touch solution for enterprises for their Pixel line of smartphones. If you provide smartphones for your business’ employees, you know how much of a hassle it is to set up these devices. This new zero-touch policy attempts to make a change to this.

Continue reading

Avoid Bad Luck With A Data Backup and Recovery System

Avoid Bad Luck With A Data Backup and Recovery System

Whether you are suspicious or not, today seems like a good day to talk out what can happen if some bad luck interferes with your business. Disasters can come in all shapes and sizes, from a freak storm destroying your place of business and every IT component you had inside, to an employee whose path was crossed by a black cat accidentally spilling their coffee on their keyboard as they access some key data.

Tags:
Continue reading

The Biggest Security Risk Comes from an Unexpected Source

The Biggest Security Risk Comes from an Unexpected Source

A surprising number of security issues come from inside your organization. User error on the part of the employee can present major problems for your workflow, data security, and the integrity of your business. User error could be something as simple as an employee clicking on the wrong links when they receive a suspicious email in their inbox, or if they are accessing data that they simply have no business accessing in the first place. Sometimes businesses will even completely forget to remove employee credentials when they leave a project or the company creating a breachable hole in your network. Regardless of the reason, user error can be a detrimental occurrence, and one which must be prepared for.

Tags:
Continue reading

Latest Blog Entry

  KRACK kills...your WiFi security. WPA2 has been the standard for securing Wi-Fi access points- especially for businesses. However, a newly discovered flaw, has emerged; allowing cybercriminals ...

Latest News

Our Site Has Launched!

flag

Welcome to Our New Site!
We are proud to announce the unveiling of our new website at Eckstrom Consulting!

Read more...

Contact Us

Learn more about what Eckstrom Consulting can do for your business.

callphone

Call us today   406-730-5105

100 2nd Street East
Whitefish, Montana 59937

Facebook icon Twitter icon Linkedin icon Google Plus icon yelpicon youtube RSS Feed